What is the principle of least privilege (POLP)?

The principle of least privilege (POLP) is a concept in computer security that limits users’ access rights to only what is strictly required to do their jobs. Read more »

What is business continuity software?

Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate. Read more »

Dutch study uncovers cognitive biases undermining cyber security board decisions

Dutch research reveals how cognitive biases can lead to catastrophic security decisions Read more »

Cloudflare to let customers block AI web crawlers

Publishers and other providers of creative content now have the option to block AI crawlers from accessing and scraping their intellectual property with new tools from Cloudflare. Read more »

What is a threat actor?

A threat actor, also called a malicious actor, is an entity that poses a security risk and seeks to cause harm to individuals, devices, networks or digital systems, often... Read more »

What is the ISO 31000 Risk Management standard?

The ISO 31000 Risk Management framework is an international standard that provides organizations with guidelines and principles for risk management. Read more »

Better governance is required for AI agents

The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data... Read more »

Why AI reliability is the next frontier for technical industries

AI is no longer a futuristic idea — it’s embedded in the core operations of many of today’s industries. But can we trust its outputs? Read more »

What is phishing? Understanding enterprise phishing threats

Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person to trick users into revealing sensitive information. Read more »

Citrix Bleed 2 under active attack, reports suggest

Days after news emerged of a new Citrix NetScaler flaw comparable in its scope and severity to 2023’s infamous Citrix Bleed, there are already clear indicators that threat actors... Read more »
Subscribe to our Newsletter